SecureOwl, to infosec

Did you know, there is an easter egg in the logo design for each Infosec Diaries series?

Pen Test Diaries = the logo goes from the outside in.

Digital Forensic Diaries = the logo works backwards.

Blue Team Diaries = stuck in the middle of it all!

Find out more about all of them at https://infosecdiaries.com.

mw, to Powershell German

Look what finally arrived!!! 🥳📚

I was already feeling a bit jealous; everyone already received their preordered copy, but my author copy was still missing until now 😄

⭐️📖 Get the book: https://packt.link/MiriamCW

SecureOwl, to infosec

As a reminder, www.infosecdiaries.com is where you'll find a collection of short stories, based on real world information security happenings. It should not be confused with www.infosecdairies.com, which is where you'll find a collection of information security inspired dairy products.

Honestly, I don't understand the confusion, but hopefully this helps.

reginagrogan, to privacy
@reginagrogan@mastodon.social avatar

Ask me once, and if i say no, never bother me again.

Thats my manifesto, manifesto, manifesto and manifesto rolled into one.

Dont bother me.

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Good day all! If you have been looking for technical and behavioral artifacts regarding CVE-2023-2868, look no further! Mandiant (now part of Google Cloud) takes a deep-dive into , a Chinese-nexus threat group, activity that shows how the group is growing in maturity and sophistication. There is a lot to learn about TTPs from this article and I hope you enjoy it as much as I did! Happy Hunting everyone!

Diving Deep into UNC4841 Operations Following Barracuda ESG Zero-Day Remediation (CVE-2023-2868)
https://www.mandiant.com/resources/blog/unc4841-post-barracuda-zero-day-remediation

aagot, to random

I am soon starting a new job doing , and I feel way out of my comfort zone. They told me I did well on the technical interview, but I was just applying my incident response experience and freestyling it. I feel a bit like threat hunting is peak , and it is a bit soon to peak after just a year and a half in the industry, so I have managed to give myself impostor syndrome anxiety. Oh well. If I managed to trick my way this far, I should keep going and see how far it takes me.

SecureOwl, to infosec

Had a blast at Blue Team Con in Chicago this weekend, met lots of folks, listened to lots of talks, and was lucky enough to give one of my own. Thanks to everyone that came, and thanks to @BlueTeamCon for the opportunity.

Me giving at talk at Blue Team Con as not an owl

ericonidentity, to infosec

For anyone at @BlueTeamCon who wants to understand why many forms of MFA are not phishing-resistant and why passkeys/FIDO2 are, tomorrow at 12:20pm during lunch in the room I’ll be delivering an impromptu session on resistant authentication, including a live demo of .

ericonidentity, to infosec

If you are at any stage in your or career and curious how to start or expand yourself as an identity practitioner, come check out my talk on Track 2 at @BlueTeamCon 2023 today at 12:00pm.

coffe, to DEFCON

OooOk Fediverse,

what's the best way to follow from afar if you don't have a Twitter account. Who to follow on Fediverse. Is there great blogs? Perhaps livestreams on YouTube or twitch?

Please boost 🥳

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Follow the Trend Micro researchers as they dissect the Big Head Ransomware variants. What I look for in these types of reports are the behaviors that are uncovered through the analysis and how I can apply these artifacts to a hunt in my environment. For example, one artifact they discovered how the malware was designed to delete the backups on the compromised machine. Recognizing and learning these behaviors is crucial to conducting a successful threat hunt! Enjoy and Happy Hunting!

Tailing Big Head Ransomware’s Variants, Tactics, and Impact
https://www.trendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html?utm_source=trendmicroresearch&utm_medium=smk&utm_campaign=0723_bighead-TW

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

The next installment of the SentinelOne and blog series features Millie Nym as they demonstrate their unique reverse engineering techniques as they analyze a sample of ArechClient2. Enjoy and Happy Hunting!

As usual, for this , I am going to leave out a piece of information and it is your job to find it! DM me with the answer or leave a comment!
Hint: Check the links in the article!

Notable MITRE ATT&CK TTPs:
TA0005 - Defense Evasion
T1055.? - Process Injection: [fill in this blank]
T1562 - Impair Defenses: Disable or Modify Tools
T1112 - Modify Registry

TA0009 - Collection
T1005 - Data from Local System

TA0011 - Command and Control
T1102 - Web Service

Reverse Engineering Walkthrough | Analyzing A Sample Of Arechclient2
https://www.sentinelone.com/blog/reverse-engineering-walkthrough-analyzing-a-sample-of-arechclient2/

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Monday everyone! Rapid7 is the source of this and they highlight the recent activity of the known as Blackmoon, aka KRBanker. Blackmoon is back with a new campaign that is designed to deploy unwanted programs and persistence, or to stay in the victims' environment as long as possible. Enjoy and !

Link is in the comments!

I mention multiple Mitre TTPs but can you find any I left out? And I MAY have messed up some of the numbers on some of them! Let me know what needs corrected!

Notable MITRE ATT&CK TTPs:
Enterprise Matrix
TA0028 - Persistence
T1547.010 - Boot or Logon Autostart Execution: Port Monitors
T1543.001 - Create or Modify System Process: Windows Service

TA0005 - Defense Evasion
T1055.012 - Process Injection: Process Hollowing
T1562.001 - Impair Defenses: Disable or Modify Tools

TA0007 - Discovery
T1135 - Network Share Discovery

TA0040 - Impact
T1489 - Service Stop

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

everyone! I am back from a weeklong "vacation" with an article from the SentinelOne blog but the research was conducted by Pol Thill. There was a challenge thrown down by and SentinelOne looking for research that was conducted but not previously published, which I think is a really interesting concept and needs to happen more often!

Anyways, here is Pol's research on Neo_Net, the Kingpin of Spanish eCrime! Enjoy and Happy Hunting!

Link in the comments!

Notable MITRE ATT&CK TTPs and Behaviors:
Mobile Matrix:
TA0035 - Collection
T1636.004 - Protected User Data: SMS Messages

TA0037 - Command and Control
T1437.001 - Application Layer Protocol: Web Protocols
T1481.003 - Web Service: One-Way Communication

Neo_Net | The Kingpin of Spanish eCrime
https://www.sentinelone.com/blog/neo_net-the-kingpin-of-spanish-ecrime/

SecureOwl, to infosec

Learn Pen Testing, Blue Teaming and Digital Forensics

A collection of short stories, each episode in each series is based on a real-life story from the field.

Available in Paperback, on Kindle, and Audiobook

Learn more: https://www.infosecdiaries.com/

ImPureMotion, to infosec

Can we do that thing where we recommend people to follow? Trying to find all the good Infosec accounts

SecureOwl, to infosec

Hey you! Yeah you. You want some promo codes to download some of the InfoSec Diaries Series Audiobooks (https://infosecdiaries.com) for free on Audible? Of course you do! - here you go! Go quick because these can only be used once:

US Codes - redeem here -> https://www.audible.com/acx-promo

Blue Team Diaries: Mixed Up

4RG7GFB8KRDT2
5YEDFNTWT2R4U
6GCNGYWMZQFNP
7K3DUW7UNSEY9
8E64KKDEJTLEE

Digital Forensic Diaries: Vigilante

3MUEUJ7BWJPX9
4KCJ3F6GAWRLR
6988Y8D2WAN4J
A8LNTCDR9ZLTW
B4GKWWPC9H8JL

UK Codes - redeem here -> https://www.audible.co.uk/acx-promo

Blue Team Diaries: Mixed Up

CR5A7S4CE659L
D8B2NHJA29XK4
DPE284N8K4P3S
DQT36W4U6YBFL
DUHEHGXKQ2ELW

Digital Forensic Diaries: Vigilante

BDJQ4LWC55YLN
CT3B6MSFCD2C5
ECNYQBUEJXWY2
EU4XXZCRUX6H9
J8BEPCDN64T9A

LeeArchinal, to Cybersecurity
@LeeArchinal@ioc.exchange avatar

Happy Friday everyone! Travel the world with the Check Point Software Technologies Ltd research team as they report how spread uncontrollably. Enjoy and Happy Hunting!

Link in the comments!

Here is your challenge
Beginner: What MITRE ATT&CK relates to the way the malware propagates?
Intermediate: There are at least two means of persistence mentioned in this article. What are they and what are their Technique/sub-technique IDs and titles?
Extra Credit: What log sources and event codes from those log sources will capture either the beginner's or intermediate (or both) challenges activity?

SecureOwl, to infosec

The Blue Team is charged with defending an organization against an array of technical security threats.

The Blue Team Diaries allow the reader to ride along with the Blue Team at Syntatic, a Seattle-based cloud company, who are charged with keeping millions of customer records safe.

Based on the author's real-world experiences, the diaries tell fictionalised versions of responding to actual security incidents. A must-read for anyone interested in computer security or the incident response field.

https://mybook.to/BlueTeam

timb_machine, to linux

This caught my eye today:

https://vulncheck.com/blog/fake-repos-deliver-malicious-implant

Strong shades of 90s action with a touch of "We need SBOM for maldev and 3rd party risk assessments of ransomware operators".

, , ,

SecureOwl, to infosec
SecureOwl, to infosec

An increasing number of titles in the Infosec Diaries series are now available on Audible in audiobook format.

Blue Team Diaries - narrated by Kristin Aikin Salada follows a Seattle-based incident response team for a cloud software provider.

Digital Forensic Diaries - narrated by Terry Gager follows a UK-based digital forensic investigator.

You can find them here behind the large picture of my dumb face: https://www.audible.com/author/Mike-Sheward/B00JKND75S

LeeArchinal, to infosec
@LeeArchinal@ioc.exchange avatar

The known as strikes again, this time targeting think tanks, academia, and media organizations with a social engineering. The goal? Stealing Google and subscription credentials of a news and analysis service that focuses on North Korea. Enjoy and Happy Hunting!

Link in the comments!

This one is a little different. In this article, SentinelLabs mentioned ReconShark being used. Can you provide me with any TTPs that are associated with that ?

TA0001 - Initial Access
T1566.002 - Phishing: Spearphishing Link
T1566.001 - Phishing: Spearphishing File

TA0002 - Execution
T1204.001 - User Execution: Malicious Link
T1204.002 - User Execution: Malicious File

TA0006 - Credential Access
T1056.003 - Input Capture: Web Portal Capture

ReconShark TTPs:
Here is your chance to shine! Let me know what TTPs are associated with this malware!

Malicious Google Docs site (from source)

D1sk1n, to random

My team just released a new MFA bombing testing tool. It can be used in purple & red team modes to execute MFA fatigue/spamming/bombing on users. After we'll add more IdPs
AFAIK it is the first MFA bombing tool for Okta.

github.com/authomize/mfa-…

GossiTheDog, to random
@GossiTheDog@cyberplace.social avatar

deleted_by_author

  • Loading...
  • D1sk1n,

    @GossiTheDog reviving this to mention we made an open source test tool for MFA bombing on for or scenarios : https://infosec.exchange/@D1sk1n/110467851688980547

  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • GTA5RPClips
  • thenastyranch
  • khanakhh
  • cisconetworking
  • Durango
  • rosin
  • ngwrru68w68
  • DreamBathrooms
  • magazineikmin
  • Youngstown
  • ethstaker
  • slotface
  • InstantRegret
  • JUstTest
  • kavyap
  • everett
  • Leos
  • tester
  • mdbf
  • osvaldo12
  • tacticalgear
  • cubers
  • modclub
  • provamag3
  • normalnudes
  • anitta
  • lostlight
  • All magazines